| Publication | Date of Publication | Type |
|---|
| Threshold linear secret sharing to the rescue of MPC-in-the-head | 2024-08-30 | Paper |
| Unifying freedom and separation for tight probing-secure composition | 2024-02-02 | Paper |
| Higher-order DCA against standard side-channel countermeasures | 2023-10-20 | Paper |
| Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection | 2023-08-16 | Paper |
| Syndrome decoding in the head: shorter signatures from zero-knowledge proofs | 2023-06-28 | Paper |
| Dynamic random probing expansion with quasi linear asymptotic complexity | 2023-05-12 | Paper |
| Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature | 2023-04-21 | Paper |
| Random probing security: verification, composition, expansion and new constructions | 2022-11-09 | Paper |
| On the power of expansion: more efficient constructions in the random probing model | 2021-12-08 | Paper |
| Tornado: automatic generation of probing-secure masked bitsliced implementations | 2021-12-01 | Paper |
| Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison | 2020-07-20 | Paper |
| Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures | 2020-06-24 | Paper |
| Tight private circuits: achieving probing security with the least refreshing | 2019-01-23 | Paper |
| How to securely compute with noisy leakage in quasilinear complexity | 2019-01-23 | Paper |
| Lattice attacks against elliptic-curve signatures with blinded scalar multiplication | 2018-02-16 | Paper |
| On the multiplicative complexity of Boolean functions and bitsliced higher-order masking | 2018-02-14 | Paper |
| Statistical Analysis of Second Order Differential Power Analysis | 2017-08-08 | Paper |
| How Fast Can Higher-Order Masking Be in Software? | 2017-06-13 | Paper |
| Algebraic Decomposition for Probing Security | 2015-12-10 | Paper |
| Two Attacks on a White-Box AES Implementation | 2015-10-01 | Paper |
| White-Box Security Notions for Symmetric Encryption Schemes | 2015-10-01 | Paper |
| Higher-Order Side Channel Security and Mask Refreshing | 2015-09-18 | Paper |
| How to Estimate the Success Rate of Higher-Order Side-Channel Attacks | 2015-07-21 | Paper |
| On the Practical Security of a Leakage Resilient Masking Scheme | 2014-03-28 | Paper |
| On Double Exponentiation for Securing RSA against Fault Analysis | 2014-03-28 | Paper |
| SCARE of Secret Ciphers with SPN Structures | 2013-12-10 | Paper |
| Differential Fault Analysis of DES | 2013-07-09 | Paper |
| Masking against Side-Channel Attacks: A Formal Security Proof | 2013-05-31 | Paper |
| Conversion of Security Proofs from One Leakage Model to Another: A New Issue | 2013-02-14 | Paper |
| Higher-Order Masking Schemes for S-Boxes | 2013-01-08 | Paper |
| Mutual information analysis: a comprehensive study | 2012-01-18 | Paper |
| Theoretical and practical aspects of mutual information-based side channel analysis | 2011-04-05 | Paper |
| Affine Masking against Higher-Order Side Channel Analysis | 2011-03-15 | Paper |
| Provably Secure Higher-Order Masking of AES | 2010-08-17 | Paper |
| Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers | 2009-11-10 | Paper |
| Differential Fault Analysis on DES Middle Rounds | 2009-11-10 | Paper |
| On the Exact Success Rate of Side Channel Analysis in the Gaussian Model | 2009-11-03 | Paper |
| Securing RSA against Fault Analysis by Double Addition Chain Exponentiation | 2009-04-29 | Paper |
| Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis | 2008-09-18 | Paper |
| Side Channel Cryptanalysis of a Higher Order Masking Scheme | 2008-09-16 | Paper |